Nice article. I would also like to put out that changing a port (for ssh) should not be an end all for security. It can thwart the less intelligent automated scanners, but nowadays, these changes can be easily found out. You can confuse port scanners by adding a REJECT rule to your iptables for the port specified. This may confuse the scanner into thinking that the port being scanned is a closed and unused port.
Also, using the passwd command through stdin is not recommended for inputting in the command line. This may be stored in your shell's history file.
Nice article. I would also like to put out that changing a port (for ssh) should not be an end all for security. It can thwart the less intelligent automated scanners, but nowadays, these changes can be easily found out. You can confuse port scanners by adding a REJECT rule to your iptables for the port specified. This may confuse the scanner into thinking that the port being scanned is a closed and unused port.
Also, using the passwd command through stdin is not recommended for inputting in the command line. This may be stored in your shell's history file.